US9106601B2 - Selective delivery of content via electronic mail - Google Patents

Selective delivery of content via electronic mail Download PDF

Info

Publication number
US9106601B2
US9106601B2 US13/553,101 US201213553101A US9106601B2 US 9106601 B2 US9106601 B2 US 9106601B2 US 201213553101 A US201213553101 A US 201213553101A US 9106601 B2 US9106601 B2 US 9106601B2
Authority
US
United States
Prior art keywords
email
recipients
group
content
contact
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US13/553,101
Other versions
US20130007154A1 (en
Inventor
Al Chakra
Devon Clarke
Liam Harpur
John Rice
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US13/553,101 priority Critical patent/US9106601B2/en
Publication of US20130007154A1 publication Critical patent/US20130007154A1/en
Application granted granted Critical
Publication of US9106601B2 publication Critical patent/US9106601B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding
    • H04L51/14
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]

Definitions

  • the embodiments disclosed within this specification relate to electronic messaging systems. More particularly, the embodiments relate to selective delivery of content via electronic mail (email).
  • electronic mail electronic mail
  • Email systems are commonly used to facilitate the exchange of content among users, such as information presented in a body of an email or electronic files attached to an email.
  • documents oftentimes are encrypted.
  • documents oftentimes are encrypted with password protection.
  • password protection When a recipient receives such a document, the recipient usually is required to enter a password in order to view the document. Notwithstanding the level of security provided by the use of password protection, security continues to be a significant concern in those organizations that use email to facilitate the exchange of information.
  • One embodiment of the present invention can include, within a system that includes a processor and a memory, a method that includes, via the processor, identifying a first electronic mail (email) addressed to at least two groups of recipients, the first email comprising content.
  • the method further can include communicating the first email comprising the content to a first group of recipients.
  • the method also can include generating a second email different than the first email and not comprising the content, the second email comprising information that indicates a contact that the second group of recipients is to contact regarding subject matter associated with the first email, and communicating the second email to a second group of recipients.
  • Another embodiment of the present invention can include, within a system that includes a processor and a memory, a method that includes, via the processor, identifying a request from a trusted recipient to forward a first electronic mail (email) to a non-trusted recipient, the first email comprising content.
  • the method further can include generating a second email different than the first email and not comprising the content, the second email comprising information that indicates a contact that the non-trusted recipient is to contact regarding subject matter associated with the first email, and communicating the second email to the non-trusted recipient.
  • Yet another embodiment of the present invention can include a computer program product including a computer-readable storage medium having computer-readable program code that, when executed, causes a machine to perform the various methods and/or functions described herein.
  • Another embodiment of the present invention can include a memory and a processor configured to perform various methods and/or functions described herein.
  • FIG. 1 is a block diagram illustrating a system for sending content via electronic mail (email) in accordance with one embodiment of the present invention.
  • FIG. 2 depicts a view presented in an email client in accordance with an embodiment of the present invention.
  • FIG. 3 is a flow chart illustrating a method of sending content via email in accordance with an embodiment of the present invention.
  • FIG. 4 is a flow chart illustrating a method of sending content via email in accordance with another embodiment of the present invention.
  • FIG. 5 is a block diagram illustrating a system for sending content via email in accordance with an embodiment of the present invention.
  • aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer-readable medium(s) having computer-readable program code embodied, e.g., stored, thereon.
  • the computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium.
  • a computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
  • a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof.
  • a computer-readable signal medium may be any computer-readable medium that is not a computer-readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Program code embodied on a computer-readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber, cable, RF, etc., or any suitable combination of the foregoing.
  • Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • LAN local area network
  • WAN wide area network
  • Internet Service Provider an Internet Service Provider
  • These computer program instructions may also be stored in a computer-readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • the present invention relates to the sending of content, such as information in the body of an electronic mail (email) or an attachment to an email. More particularly, the present invention provides functionality that enables a user to provide content with an email, and send different versions of the email to different groups of recipients. For example, a first group of recipients can be sent a first email having the content, and such recipients can be provided access to the content. A second group of recipients can be sent a second email, which is different than the first email, that does not include the content. The second email can provide information to the second group of users that pertains to the first email. For example, within the second email, contact information can be provided to indicate to the second group of recipients who those recipients may contact to discuss information to which the email pertains.
  • the second email can indicate a suitable time when the second group of recipients may contact the person to discuss and/or receive information regarding subject matter associated with the first email.
  • the email can be sent to different users, or groups of users, at different times.
  • FIG. 1 is a block diagram illustrating a system 100 for sending an email 120 comprising content 122 in accordance with one embodiment of the present invention.
  • the system 100 can include a plurality of email clients 102 , 104 , 106 , each of which are communicatively linked to a communication network 110 .
  • the communication network 110 can comprise a local area network (LAN), a wide area network (WAN), the Internet, and/or any other communication system through which emails may be communicated.
  • LAN local area network
  • WAN wide area network
  • the Internet and/or any other communication system through which emails may be communicated.
  • the email clients 102 - 106 can be executed on any suitable devices, for example on computers, personal digital assistance, mobile telephones, or the like.
  • a user can configure a first email 120 to be sent to a plurality of recipients, for example users associated with email clients 104 , 106 .
  • the email 120 can include content 122 .
  • Such content 122 can be information presented in the body of the email 120 or an attachment to the email 120 .
  • Information presented in the body of the email can include alphanumeric text, graphics, or any other type of information that may be included within the body of an email.
  • An email attachment can be any electronic file that may be transferred as an attachment to an email.
  • an email attachment can be an electronic document, a file comprising computer program code, etc.
  • the first email 120 can be sent via an email server 130 .
  • Email servers are well known to those skilled in the art.
  • a user composing the email 120 can identify one or more recipients (a first group of recipients) to receive the content 122 and one or more recipients (a second group of recipients) that are not to receive the content 120 . Such recipients can be those recipients deemed to be trusted with the content 122 sent with the email 120 .
  • a recipient is a person to whom an email is directed.
  • the email 120 can be sent to those recipients.
  • the email 120 can be sent to email accounts for the first group of recipients, and the email clients 104 can retrieve the emails 120 for presentation to such recipients.
  • a second email 140 can be automatically composed, either by the email client 102 or the email server 130 , and communicated to such recipients.
  • the second email 140 can be sent from the email client 102 to email accounts associated with the second group of recipients and the email clients 106 can retrieve the emails 140 for presentation to such recipients.
  • trusted recipients who receive the first email 120 can elect to forward the email 120 to the non-trusted recipients.
  • the second email 140 can be automatically generated and sent to the non-trusted recipients in lieu of the first email 120 .
  • any recipient to whom the first email is being forwarded can be considered a non-trusted recipient.
  • potential recipients of forwarded emails can be assigned security credentials. When the email 120 is to be sent to a recipient, the recipient's security credentials can be accessed. Based on the security credentials, a determination can be made as to whether the recipient is categorized as being trusted or being non-trusted.
  • the first email 120 can be forwarded to the recipient. If the recipient is non-trusted, the second email 140 can be forwarded to the recipient.
  • the second email 140 can be generated by the email client 104 of the user who chooses to forward the email, or by the email server 130 . Moreover, the email client 104 or the email server 130 can determine whether a recipient of a forwarded email 120 is trusted or non-trusted.
  • the second email 140 need not include the content 122 .
  • the second email 140 can include information 142 that pertains to the first email 120 .
  • the information 142 can include contact information that indicates to the second group of recipients who may be contacted to discuss the email 140 , or related matters. For example, if the content 122 is a new version of a computer program, the new version can be sent to only those users who are authorized to evaluate the new version. Nonetheless, via the email 140 , other users can be informed that the new version of the computer program has been sent to those who will be evaluating it.
  • the email 140 can indicate to the other users who they may contact if they wish to participate in the evaluation process. In this regard, those wishing to participate may be asked to execute a confidentiality agreement prior to being given access to the computer program.
  • the second email 140 can indicate a suitable time when the second group of recipients may contact the person to discuss and/or receive information to which the email 140 pertains.
  • the recipients receiving the email 120 do not own or control the content 122 .
  • the second group of recipients will not be able to access the content 122 , or any information related to the content 122 , via the email 140 .
  • the email 140 can be customized to indicate to a first subgroup of the users to contact the person at a first time, indicate to a second subgroup of the users to contact the person at a second time, indicate to a third subgroup of the users to contact the person at a third time, and so on.
  • the subgroups can be defined in any suitable manner.
  • each of the recipients that are members of the second group of recipients can be assigned to a subgroup based on the recipient's respective level within an organizational hierarchy.
  • the second email 140 can be configured to automatically add a calendar entry pertaining to the information into respective electronic calendars of the second group of recipients.
  • the second email 140 can be sent to different recipients, or subgroups of recipients, at different times.
  • recipients that are members of the second group of recipients can be classified into a plurality of subgroups.
  • the email 140 can be sent to a first subgroup of recipients at first time, a second subgroup of recipients at a second time, and a third subgroup of recipients at a third time.
  • the second email 140 can assign each subgroup of recipients a particular time at which to contact the person who is authorized to provide further information regarding the email 140 .
  • the risk of recipients inundating a person to be contacted in response to the email 140 being received can be minimized.
  • the present invention mitigates the risk of unauthorized information leaks, thereby improving the security of electronic data.
  • FIG. 2 depicts a view 200 presented in an email client in accordance with another embodiment of the present invention.
  • a user e.g., an email sender
  • At least one of the options can pertain to attaching an electronic file to the email so that the electronic file will be sent with the email.
  • an “Attach” selectable object 202 e.g., a button or icon
  • the “Attach” selectable object 202 can be presented with text, graphics, or in any suitable manner.
  • a menu (not shown) can be presented in the view 200 , or over the view 200 , to facilitate user selection of one or more electronic files to attach to the email.
  • such electronic file(s) can be attached to the email.
  • “Attach” selectable objects are well known to those skilled in the art.
  • the user can drag one or more user interface objects representing electronic files over the view 200 to cause such electronic files to be attached to the email, as also known to those skilled in the art.
  • the view 200 can include a “FYI” field 210 .
  • the user can identify e-mail recipients who are to receive the email, but not receive the content.
  • E-mail recipients identified in the fields 204 - 208 can receive the content, however.
  • the email recipients identified in the fields 204 - 208 can receive the email as the email is originally composed by the sender of the email, including the content.
  • E-mail recipients identified in the field 210 can be sent a second email that does not include the content. Further, the second email can include information relating to the first email. Such information can indicate who is to be contacted to receive further information regarding the first email and/or the content sent with the first email.
  • the second email can be automatically generated and sent to the non-trusted recipients in lieu of the first email.
  • the second email can be generated by the email client of the user who chooses to forward the email, or by the email server.
  • At least part of the information provided in the second email can be automatically generated, for example by the email client 102 or the email server 130 depicted in FIG. 1 .
  • a new email body 214 can be automatically composed for the second email.
  • the automatically composed email body 214 can indicate to the recipients of the second email who those recipients may contact to discuss the subject matter identified in the second email.
  • the automatically composed email body 214 also can indicate to the recipients of the second email at what time they may contact the designated person. As noted, different recipients may be provided different contact times to ensure that the contact person is not inundated with information requests.
  • the second email can indicate recipients identified in the “To” field 204 and “Cc” field 206 , though this need not be the case. Further, the second email also can indicate the recipients identified in the “FYI” field 210 , but this also is not required.
  • FIG. 3 is a flow chart illustrating a method 300 of sending content via email in accordance with an embodiment of the present invention.
  • a first email addressed to two groups of recipients can be identified.
  • the first email can comprise content.
  • the first email can be communicated to a first group of recipients.
  • the first group of recipients can include recipients that are trusted recipients.
  • a second email can be generated.
  • the second email can be different than the first email and not include the content. Further, the second email can comprise information that indicates a contact that a second group of recipients are to contact regarding subject matter associated with the first email.
  • a determination can be made as to whether a number of members in a second group of recipients exceeds a threshold value.
  • the second group of recipients can be non-trusted recipients. If so, at step 308 members of the second group of recipients can be classified into a plurality of subgroups. For example, each of the members in the second group of participants can be associated with a respective level of an organization hierarchy, and the each subgroup can include members that are associated with a particular level.
  • a time at which contact is to occur can be determined based on the classification of the second group of recipients within the respective subgroups. Such time can be included within the second emails sent to the second group of recipients.
  • the second email can be customized for each subgroup to indicate to the members of that subgroup when they should establish contact with the designated entity (e.g., a person designated to be the contact).
  • the second email can be configured to automatically add a calendar entry corresponding to the time at which the contact is to occur into an electronic calendar of the non-trusted recipient.
  • the second email can be sent to the second group of participants.
  • the second email can be sent to different subgroups at different times.
  • a subgroup comprising recipients who rank high in an organizational hierarchy can first receive the second emails, a subgroup comprising next highest ranking recipients can receive the second emails at a later time, and so on.
  • FIG. 4 is a flow chart illustrating a method 400 of sending content via email in accordance with another embodiment of the present invention.
  • a request from a trusted recipient to forward a first email to a non-trusted recipient can be identified.
  • the first email can comprise content.
  • a second email different than the first email, and not comprising the content can be generated.
  • the second email can comprise information that indicates a contact that the non-trusted recipient is to contact regarding subject matter associated with the first email.
  • the second email further can comprise information that indicates a time at which to the contact is to occur.
  • the contact can be a designated entity, such as a person who is designated to be the contact.
  • the second email can be communicated to the non-trusted recipient. In one embodiment, the second email can be configured to automatically add a calendar entry corresponding to the time at which the contact is to occur into an electronic calendar of the non-trusted recipient.
  • FIG. 5 is a block diagram illustrating a system 500 for sending content via email in accordance with an embodiment of the present invention.
  • the system 500 can include at least one processor 505 coupled to memory elements 510 through a system bus 515 .
  • the system 500 can store program code within the memory elements 510 .
  • the processor 505 can execute the program code accessed from the memory elements 510 via the system bus 515 .
  • the system 500 can be implemented as computer that is suitable for storing and/or executing program code. It should be appreciated, however, that the system 500 can be implemented in the form of any system comprising a processor and memory that is capable of performing the functions described within this specification.
  • the memory elements 510 can include one or more physical memory devices such as, for example, local memory 520 and one or more bulk storage devices 525 .
  • Local memory 520 refers to random access memory or other non-persistent memory device(s) generally used during actual execution of the program code.
  • Bulk storage device(s) 525 can be implemented as a hard disk drive (HDD), a solid state drive (SSD), or other persistent data storage device.
  • the system 500 also can include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the number of times program code must be retrieved from bulk storage device 525 during execution.
  • I/O devices such as a keyboard 530 , a display 535 , and a pointing device (not shown) optionally can be coupled to the system 500 .
  • the I/O devices can be coupled to the system 500 either directly or through intervening I/O controllers.
  • Network adapters also can be coupled to the system 500 to enable the system 500 to become coupled to other systems, computer systems, remote printers, and/or remote storage devices through intervening private or public networks. Modems, cable modems, and Ethernet cards are examples of different types of network adapters that can be used with the system 500 .
  • the memory elements 510 can store an application 540 .
  • the application 540 being implemented in the form of executable program code, can be executed by the system 500 to perform the processes and method described herein.
  • the application 540 can be, for example, an email client having a plugin or other suitable program code that enables the email client to perform the functions and processes.
  • the application 540 can be an email server having a plugin or other suitable program code that enables the email client to perform the functions and processes.
  • each block in the flowcharts or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.

Abstract

A method that includes identifying a first electronic mail (email) addressed to at least two groups of recipients, the first email comprising content. The method further can include communicating the first email comprising the content to a first group of recipients. The method also can include generating a second email different than the first email and not comprising the content, the second email comprising information that indicates a contact that the second group of recipients are to contact regarding subject matter associated with the first email, and communicating the second email to a second group of recipients.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a Continuation of U.S. application Ser. No. 13/172,894, filed on Jun. 30, 2011.
BACKGROUND
The embodiments disclosed within this specification relate to electronic messaging systems. More particularly, the embodiments relate to selective delivery of content via electronic mail (email).
Email systems are commonly used to facilitate the exchange of content among users, such as information presented in a body of an email or electronic files attached to an email. To mitigate the risk of such documents from being intercepted and viewed by unscrupulous parties, such documents oftentimes are encrypted. For example, documents oftentimes are encrypted with password protection. When a recipient receives such a document, the recipient usually is required to enter a password in order to view the document. Notwithstanding the level of security provided by the use of password protection, security continues to be a significant concern in those organizations that use email to facilitate the exchange of information.
BRIEF SUMMARY
One embodiment of the present invention can include, within a system that includes a processor and a memory, a method that includes, via the processor, identifying a first electronic mail (email) addressed to at least two groups of recipients, the first email comprising content. The method further can include communicating the first email comprising the content to a first group of recipients. The method also can include generating a second email different than the first email and not comprising the content, the second email comprising information that indicates a contact that the second group of recipients is to contact regarding subject matter associated with the first email, and communicating the second email to a second group of recipients.
Another embodiment of the present invention can include, within a system that includes a processor and a memory, a method that includes, via the processor, identifying a request from a trusted recipient to forward a first electronic mail (email) to a non-trusted recipient, the first email comprising content. The method further can include generating a second email different than the first email and not comprising the content, the second email comprising information that indicates a contact that the non-trusted recipient is to contact regarding subject matter associated with the first email, and communicating the second email to the non-trusted recipient.
Yet another embodiment of the present invention can include a computer program product including a computer-readable storage medium having computer-readable program code that, when executed, causes a machine to perform the various methods and/or functions described herein.
Another embodiment of the present invention can include a memory and a processor configured to perform various methods and/or functions described herein.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
FIG. 1 is a block diagram illustrating a system for sending content via electronic mail (email) in accordance with one embodiment of the present invention.
FIG. 2 depicts a view presented in an email client in accordance with an embodiment of the present invention.
FIG. 3 is a flow chart illustrating a method of sending content via email in accordance with an embodiment of the present invention.
FIG. 4 is a flow chart illustrating a method of sending content via email in accordance with another embodiment of the present invention.
FIG. 5 is a block diagram illustrating a system for sending content via email in accordance with an embodiment of the present invention.
DETAILED DESCRIPTION
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer-readable medium(s) having computer-readable program code embodied, e.g., stored, thereon.
Any combination of one or more computer-readable medium(s) may be utilized. The computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium. A computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer-readable signal medium may be any computer-readable medium that is not a computer-readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer-readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber, cable, RF, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer, other programmable data processing apparatus, or other devices create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The present invention relates to the sending of content, such as information in the body of an electronic mail (email) or an attachment to an email. More particularly, the present invention provides functionality that enables a user to provide content with an email, and send different versions of the email to different groups of recipients. For example, a first group of recipients can be sent a first email having the content, and such recipients can be provided access to the content. A second group of recipients can be sent a second email, which is different than the first email, that does not include the content. The second email can provide information to the second group of users that pertains to the first email. For example, within the second email, contact information can be provided to indicate to the second group of recipients who those recipients may contact to discuss information to which the email pertains. Further, the second email can indicate a suitable time when the second group of recipients may contact the person to discuss and/or receive information regarding subject matter associated with the first email. In one aspect, for example when there are many users identified in the second group of recipients, the email can be sent to different users, or groups of users, at different times.
FIG. 1 is a block diagram illustrating a system 100 for sending an email 120 comprising content 122 in accordance with one embodiment of the present invention. The system 100 can include a plurality of email clients 102, 104, 106, each of which are communicatively linked to a communication network 110. The communication network 110 can comprise a local area network (LAN), a wide area network (WAN), the Internet, and/or any other communication system through which emails may be communicated. As those skilled in the art will appreciate, the email clients 102-106 can be executed on any suitable devices, for example on computers, personal digital assistance, mobile telephones, or the like.
In operation, via the email client 102, a user can configure a first email 120 to be sent to a plurality of recipients, for example users associated with email clients 104, 106. The email 120 can include content 122. Such content 122 can be information presented in the body of the email 120 or an attachment to the email 120. Information presented in the body of the email can include alphanumeric text, graphics, or any other type of information that may be included within the body of an email. An email attachment can be any electronic file that may be transferred as an attachment to an email. For example, an email attachment can be an electronic document, a file comprising computer program code, etc. The first email 120 can be sent via an email server 130. Email servers are well known to those skilled in the art.
A user composing the email 120 can identify one or more recipients (a first group of recipients) to receive the content 122 and one or more recipients (a second group of recipients) that are not to receive the content 120. Such recipients can be those recipients deemed to be trusted with the content 122 sent with the email 120. As used herein, a recipient is a person to whom an email is directed. For the first group of recipients that are identified to receive the email content 122, the email 120 can be sent to those recipients. In illustration, the email 120 can be sent to email accounts for the first group of recipients, and the email clients 104 can retrieve the emails 120 for presentation to such recipients.
For the second group of recipients identified to not receive the content 122, for example non-trusted recipients, a second email 140 can be automatically composed, either by the email client 102 or the email server 130, and communicated to such recipients. In illustration, the second email 140 can be sent from the email client 102 to email accounts associated with the second group of recipients and the email clients 106 can retrieve the emails 140 for presentation to such recipients.
In another embodiment, rather than the email client 102 sending the second email 140 to the non-trusted recipients, trusted recipients who receive the first email 120 can elect to forward the email 120 to the non-trusted recipients. In illustration, when a trusted recipient chooses to forward the first email 120 to non-trusted recipients, the second email 140 can be automatically generated and sent to the non-trusted recipients in lieu of the first email 120. In one arrangement, any recipient to whom the first email is being forwarded can be considered a non-trusted recipient. In another arrangement, potential recipients of forwarded emails can be assigned security credentials. When the email 120 is to be sent to a recipient, the recipient's security credentials can be accessed. Based on the security credentials, a determination can be made as to whether the recipient is categorized as being trusted or being non-trusted. If the recipient is trusted, the first email 120 can be forwarded to the recipient. If the recipient is non-trusted, the second email 140 can be forwarded to the recipient. The second email 140 can be generated by the email client 104 of the user who chooses to forward the email, or by the email server 130. Moreover, the email client 104 or the email server 130 can determine whether a recipient of a forwarded email 120 is trusted or non-trusted.
The second email 140 need not include the content 122. Instead, the second email 140 can include information 142 that pertains to the first email 120. The information 142 can include contact information that indicates to the second group of recipients who may be contacted to discuss the email 140, or related matters. For example, if the content 122 is a new version of a computer program, the new version can be sent to only those users who are authorized to evaluate the new version. Nonetheless, via the email 140, other users can be informed that the new version of the computer program has been sent to those who will be evaluating it. Moreover, the email 140 can indicate to the other users who they may contact if they wish to participate in the evaluation process. In this regard, those wishing to participate may be asked to execute a confidentiality agreement prior to being given access to the computer program.
Further, the second email 140 can indicate a suitable time when the second group of recipients may contact the person to discuss and/or receive information to which the email 140 pertains. Notably, the recipients receiving the email 120 do not own or control the content 122. In this regard, other than the information provided in the second email 140, the second group of recipients will not be able to access the content 122, or any information related to the content 122, via the email 140.
In one aspect, for example when there are many users identified in the second group of recipients, the email 140 can be customized to indicate to a first subgroup of the users to contact the person at a first time, indicate to a second subgroup of the users to contact the person at a second time, indicate to a third subgroup of the users to contact the person at a third time, and so on. The subgroups can be defined in any suitable manner. For example, each of the recipients that are members of the second group of recipients can be assigned to a subgroup based on the recipient's respective level within an organizational hierarchy. In this regard, the second email 140 can be configured to automatically add a calendar entry pertaining to the information into respective electronic calendars of the second group of recipients.
Further, the second email 140 can be sent to different recipients, or subgroups of recipients, at different times. In illustration, recipients that are members of the second group of recipients can be classified into a plurality of subgroups. The email 140 can be sent to a first subgroup of recipients at first time, a second subgroup of recipients at a second time, and a third subgroup of recipients at a third time. Further the second email 140 can assign each subgroup of recipients a particular time at which to contact the person who is authorized to provide further information regarding the email 140. Thus, the risk of recipients inundating a person to be contacted in response to the email 140 being received can be minimized.
By controlling how the content 122 is distributed as described herein, the present invention mitigates the risk of unauthorized information leaks, thereby improving the security of electronic data.
FIG. 2 depicts a view 200 presented in an email client in accordance with another embodiment of the present invention. In the view 200, a user (e.g., an email sender) can be presented a number of options for composing an email, such as the email 120 of FIG. 1. At least one of the options can pertain to attaching an electronic file to the email so that the electronic file will be sent with the email. For example, an “Attach” selectable object 202 (e.g., a button or icon) can be presented in the view 200. The “Attach” selectable object 202 can be presented with text, graphics, or in any suitable manner. When a user selects the “Attach” selectable object 202, a menu (not shown) can be presented in the view 200, or over the view 200, to facilitate user selection of one or more electronic files to attach to the email. In response to the user selecting one or more electronic files, such electronic file(s) can be attached to the email. “Attach” selectable objects are well known to those skilled in the art. In another arrangement, the user can drag one or more user interface objects representing electronic files over the view 200 to cause such electronic files to be attached to the email, as also known to those skilled in the art.
In addition to conventional recipient fields, such as a “To” field 204, a “Cc” field 206, and a “Bcc” field 208, the view 200 can include a “FYI” field 210. In the “FYI” field 210, the user can identify e-mail recipients who are to receive the email, but not receive the content. E-mail recipients identified in the fields 204-208 can receive the content, however. In illustration, the email recipients identified in the fields 204-208 can receive the email as the email is originally composed by the sender of the email, including the content. E-mail recipients identified in the field 210 can be sent a second email that does not include the content. Further, the second email can include information relating to the first email. Such information can indicate who is to be contacted to receive further information regarding the first email and/or the content sent with the first email.
Further, when a trusted recipient who received the first email chooses to forward the first email to one or more non-trusted recipients, for example by selecting a “Forward” user interface object 212, the second email can be automatically generated and sent to the non-trusted recipients in lieu of the first email. The second email can be generated by the email client of the user who chooses to forward the email, or by the email server.
In one embodiment, at least part of the information provided in the second email can be automatically generated, for example by the email client 102 or the email server 130 depicted in FIG. 1. In illustration, rather than sending the body of the originally composed email, a new email body 214 can be automatically composed for the second email. The automatically composed email body 214 can indicate to the recipients of the second email who those recipients may contact to discuss the subject matter identified in the second email. The automatically composed email body 214 also can indicate to the recipients of the second email at what time they may contact the designated person. As noted, different recipients may be provided different contact times to ensure that the contact person is not inundated with information requests.
The second email can indicate recipients identified in the “To” field 204 and “Cc” field 206, though this need not be the case. Further, the second email also can indicate the recipients identified in the “FYI” field 210, but this also is not required.
FIG. 3 is a flow chart illustrating a method 300 of sending content via email in accordance with an embodiment of the present invention. At step 302, a first email addressed to two groups of recipients can be identified. The first email can comprise content. At step 304, the first email can be communicated to a first group of recipients. The first group of recipients can include recipients that are trusted recipients. At step 306, a second email can be generated. The second email can be different than the first email and not include the content. Further, the second email can comprise information that indicates a contact that a second group of recipients are to contact regarding subject matter associated with the first email.
At decision box 308, a determination can be made as to whether a number of members in a second group of recipients exceeds a threshold value. The second group of recipients can be non-trusted recipients. If so, at step 308 members of the second group of recipients can be classified into a plurality of subgroups. For example, each of the members in the second group of participants can be associated with a respective level of an organization hierarchy, and the each subgroup can include members that are associated with a particular level. At step 310, a time at which contact is to occur can be determined based on the classification of the second group of recipients within the respective subgroups. Such time can be included within the second emails sent to the second group of recipients. More particularly, the second email can be customized for each subgroup to indicate to the members of that subgroup when they should establish contact with the designated entity (e.g., a person designated to be the contact). In one embodiment, the second email can be configured to automatically add a calendar entry corresponding to the time at which the contact is to occur into an electronic calendar of the non-trusted recipient.
Regardless of whether the members of the second group of participants are classified into a plurality of subgroups, at step 312 the second email can be sent to the second group of participants. In one embodiment, the second email can be sent to different subgroups at different times. In illustration, a subgroup comprising recipients who rank high in an organizational hierarchy can first receive the second emails, a subgroup comprising next highest ranking recipients can receive the second emails at a later time, and so on.
FIG. 4 is a flow chart illustrating a method 400 of sending content via email in accordance with another embodiment of the present invention. At step 402, a request from a trusted recipient to forward a first email to a non-trusted recipient can be identified. The first email can comprise content. At step 404, a second email different than the first email, and not comprising the content, can be generated. The second email can comprise information that indicates a contact that the non-trusted recipient is to contact regarding subject matter associated with the first email. The second email further can comprise information that indicates a time at which to the contact is to occur. The contact can be a designated entity, such as a person who is designated to be the contact. At step 406. The second email can be communicated to the non-trusted recipient. In one embodiment, the second email can be configured to automatically add a calendar entry corresponding to the time at which the contact is to occur into an electronic calendar of the non-trusted recipient.
FIG. 5 is a block diagram illustrating a system 500 for sending content via email in accordance with an embodiment of the present invention. The system 500 can include at least one processor 505 coupled to memory elements 510 through a system bus 515. As such, the system 500 can store program code within the memory elements 510. The processor 505 can execute the program code accessed from the memory elements 510 via the system bus 515. In one aspect, for example, the system 500 can be implemented as computer that is suitable for storing and/or executing program code. It should be appreciated, however, that the system 500 can be implemented in the form of any system comprising a processor and memory that is capable of performing the functions described within this specification.
The memory elements 510 can include one or more physical memory devices such as, for example, local memory 520 and one or more bulk storage devices 525. Local memory 520 refers to random access memory or other non-persistent memory device(s) generally used during actual execution of the program code. Bulk storage device(s) 525 can be implemented as a hard disk drive (HDD), a solid state drive (SSD), or other persistent data storage device. The system 500 also can include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the number of times program code must be retrieved from bulk storage device 525 during execution.
Input/output (I/O) devices such as a keyboard 530, a display 535, and a pointing device (not shown) optionally can be coupled to the system 500. The I/O devices can be coupled to the system 500 either directly or through intervening I/O controllers. Network adapters also can be coupled to the system 500 to enable the system 500 to become coupled to other systems, computer systems, remote printers, and/or remote storage devices through intervening private or public networks. Modems, cable modems, and Ethernet cards are examples of different types of network adapters that can be used with the system 500.
As pictured in FIG. 5, the memory elements 510 can store an application 540. The application 540, being implemented in the form of executable program code, can be executed by the system 500 to perform the processes and method described herein. The application 540 can be, for example, an email client having a plugin or other suitable program code that enables the email client to perform the functions and processes. In another example, the application 540 can be an email server having a plugin or other suitable program code that enables the email client to perform the functions and processes.
Like numbers have been used to refer to the same items throughout this specification. The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowcharts or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (17)

The invention claimed is:
1. Within a system comprising a processor and a memory, a method comprising:
via the processor, identifying a first electronic mail (email) addressed to at least two groups of recipients, the first email comprising content;
communicating the first email comprising the content to a first group of recipients;
generating a second email different than the first email and not comprising the content within the first email, a body of the second email indicating a contact regarding subject matter associated with the content within the first email; and
communicating the second email to a second group of recipients.
2. The method of claim 1, wherein
the second email further comprises information that indicates a time at which to the contact is to occur.
3. The method of claim 2, wherein
the second email is configured to automatically add a calendar entry corresponding to the time at which the contact is to occur into electronic calendars of the second group of recipients.
4. The method of claim 2, further comprising:
classifying members of the second group of recipients into a plurality of subgroups; and
determining the time at which to the contact is to occur is based on the classification of the members of the second group of recipients within the respective subgroups.
5. The method of claim 4, further comprising
classifying the members of the second group of recipients within the respective subgroups based on an association of each member of the second group of recipients with a respective level of an organizational hierarchy.
6. The method of claim 2, wherein
communicating the second email to the second group of the recipients comprises:
classifying members of the second group of recipients into a plurality of subgroups; and
determining the time at which to communicate the second email is based on a classification of the members of the second group of recipients within the respective subgroups.
7. The method of claim 6, wherein
classifying the members of the second group of recipients into the plurality of subgroups comprises associating each of the members of the second group of recipients with a respective level of an organizational hierarchy.
8. The method of claim 1, wherein
the first group of recipients comprises trusted recipients and the second group of recipients comprises non-trusted recipients.
9. Within a system comprising a processor and a memory, a method comprising:
via the processor, identifying a request from a trusted recipient to forward a first electronic mail (email) to a non-trusted recipient, the first email comprising content;
generating a second email different than the first email and not comprising the content within the first email, a body of the second email indicating a contact regarding subject matter associated with the content within the first email; and
communicating the second email to the non-trusted recipient.
10. The method of claim 9, wherein
the second email further comprises information that indicates a time at which to the contact is to occur.
11. The method of claim 10, wherein
the second email is configured to automatically add a calendar entry corresponding to the time at which the contact is to occur into an electronic calendar of the non-trusted recipient.
12. A method, within and by a computer hardware system including a processor and a memory, comprising:
identifying a first email addressed to a first group of recipients and a second group of recipients, the first email including content;
communicating, to the first group of recipients, the first email including the content;
generating, based upon the first email, a second email different than the first email and not including the content within the first email, a body of the second email indicating a contact regarding subject matter associated with the content within the first email; and
communicating the second email to the second group of recipients.
13. The method of claim 12, wherein
the second email indicates a time at which to the contact is to occur.
14. The method of claim 13, wherein
the second email is configured to automatically add a calendar entry corresponding to the time at which the contact is to occur into electronic calendars of the second group of recipients.
15. The method of claim 13, further comprising:
classifying members of the second group of recipients into a plurality of subgroups; and
determining the time at which to the contact is to occur based upon a classification of the members of the second group of recipients within the respective subgroups.
16. The method of claim 15, wherein
the classifying is based on an association of each member of the second group of recipients with a respective level of an organizational hierarchy.
17. The method of claim 12, wherein
the first group of recipients are classified as trusted recipients, and
the second group of recipients are classified as non-trusted recipients.
US13/553,101 2011-06-30 2012-07-19 Selective delivery of content via electronic mail Active 2032-01-12 US9106601B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/553,101 US9106601B2 (en) 2011-06-30 2012-07-19 Selective delivery of content via electronic mail

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/172,894 US9021030B2 (en) 2011-06-30 2011-06-30 Selective delivery of content via electronic mail
US13/553,101 US9106601B2 (en) 2011-06-30 2012-07-19 Selective delivery of content via electronic mail

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/172,894 Continuation US9021030B2 (en) 2011-06-30 2011-06-30 Selective delivery of content via electronic mail

Publications (2)

Publication Number Publication Date
US20130007154A1 US20130007154A1 (en) 2013-01-03
US9106601B2 true US9106601B2 (en) 2015-08-11

Family

ID=46261871

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/172,894 Active 2033-04-19 US9021030B2 (en) 2011-06-30 2011-06-30 Selective delivery of content via electronic mail
US13/553,101 Active 2032-01-12 US9106601B2 (en) 2011-06-30 2012-07-19 Selective delivery of content via electronic mail

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/172,894 Active 2033-04-19 US9021030B2 (en) 2011-06-30 2011-06-30 Selective delivery of content via electronic mail

Country Status (3)

Country Link
US (2) US9021030B2 (en)
DE (1) DE102012209957A1 (en)
GB (1) GB2492441A (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9021030B2 (en) 2011-06-30 2015-04-28 International Business Machines Corporation Selective delivery of content via electronic mail
US11283745B2 (en) * 2016-08-29 2022-03-22 Kailyn Cage Different specific messaging to multiple recipients from a single message
US20220398646A1 (en) * 2021-06-11 2022-12-15 Shopify Inc. Systems and methods for obscuring content in electronic messages

Citations (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6185684B1 (en) 1998-08-28 2001-02-06 Adobe Systems, Inc. Secured document access control using recipient lists
US6237099B1 (en) 1996-02-14 2001-05-22 Fuji Xerox Co., Ltd. Electronic document management system
US20010037364A1 (en) 2000-05-10 2001-11-01 Michalek Nancy R. Management of enterprise communications
US20020013817A1 (en) 2000-07-07 2002-01-31 Collins Thomas M. Method and apparatus for distributing of e-mail to multiple recipients
US20020082894A1 (en) 2000-12-19 2002-06-27 Nec Corporation Business information system and method of managing business information
US20020116242A1 (en) * 2001-02-22 2002-08-22 Vercellone James J. Emergency response synchronization matrix
US20020178229A1 (en) 2001-04-23 2002-11-28 Pradeep Sinha Methods, systems, and emails to link emails to matters and organizations
WO2003046746A1 (en) 2001-11-28 2003-06-05 Peter Weissman Mail program for processing multiple email messages
US6769002B2 (en) 2001-11-08 2004-07-27 Jordan E. Ayan System and methods for multilevel electronic mail communication programs
US6810408B1 (en) 2000-05-31 2004-10-26 International Business Machines Corporation Method and apparatus for controlling cascading e-mail distribution
US20050108351A1 (en) 2003-11-13 2005-05-19 International Business Machines Corporation Private email content
US20060015564A1 (en) 2004-07-19 2006-01-19 Steve Angelica Modulated cascading electronic messaging network
US20060041624A1 (en) 2004-08-18 2006-02-23 International Business Machines Corporation System and method for distributing an electronic message
US20060248175A1 (en) * 2003-05-23 2006-11-02 Jinks William R Method and system for information distribution
US20070192465A1 (en) 2006-02-10 2007-08-16 Modarressi Abdi R Methods, systems, and products for accessing common functions for multiple applications
US20070226300A1 (en) 2006-03-27 2007-09-27 Suzelle Smith System and method to prevent the sending of email messages to unqualified recipients
US7353256B2 (en) * 2000-03-14 2008-04-01 Varolii Corporation Application program interface for message routing and management system
US20080168135A1 (en) 2007-01-05 2008-07-10 Redlich Ron M Information Infrastructure Management Tools with Extractor, Secure Storage, Content Analysis and Classification and Method Therefor
US7406507B2 (en) * 2000-03-24 2008-07-29 Piccioni Robert L Method and system for situation tracking and notification
US20080189162A1 (en) * 2006-10-20 2008-08-07 Ray Ganong System to establish and maintain intuitive command and control of an event
US20080222257A1 (en) 2007-03-10 2008-09-11 Shamik Mukherjee Systems and methods for sending customized emails to recipient groups
US20080301227A1 (en) 2005-10-07 2008-12-04 Clayton James D Hierarchical document publishing
US20090049134A1 (en) 2007-08-16 2009-02-19 David Bruce Kumhyr Method for delaying delivery of e-mail content
US20090077045A1 (en) * 2003-06-25 2009-03-19 3N Global, Inc. Online Notification System
US7529940B1 (en) 2002-11-22 2009-05-05 Novell, Inc. Securing selected data within a message
US20090171744A1 (en) * 2007-12-28 2009-07-02 Hake Richard L System and method for reducing employee training time and distributing corporate and job information to employees
US20090198777A1 (en) 2008-01-31 2009-08-06 Embarq Holdings Company Llc System and method for a messaging assistant
US20090222382A1 (en) * 2003-02-28 2009-09-03 Neighborhood America Platform for management of internet based public communications and public comment
US20090265755A1 (en) 2008-04-18 2009-10-22 International Business Machines Corporation Firewall methodologies for use within virtual environments
US20090319623A1 (en) 2008-06-24 2009-12-24 Oracle International Corporation Recipient-dependent presentation of electronic messages
US7672999B2 (en) 2002-01-08 2010-03-02 International Business Machines Corporation Transmitting common and unique information selectively to different recipients
US20100100600A1 (en) 2007-03-29 2010-04-22 Thompson Simon G Distributing data messages
US20100098231A1 (en) 2008-10-22 2010-04-22 Randolph Wohlert Systems and Methods for Providing a Personalized Communication Processing Service
US7730140B2 (en) * 2005-02-28 2010-06-01 Microsoft Corporation Bifurcation of messages in an extensible message transfer system
US20100229246A1 (en) 2009-03-04 2010-09-09 Connor Stephen Warrington Method and system for classifying and redacting segments of electronic documents
US7831669B2 (en) * 2005-02-28 2010-11-09 Microsoft Corporation Reprocessing of messages in an extensible message transfer system
US20110029622A1 (en) * 2009-06-24 2011-02-03 Walker Jay S Systems and methods for group communications
US7890593B2 (en) 2008-07-17 2011-02-15 International Business Machines Corporation Sectional E-mail Transmission
US20110126126A1 (en) 2008-03-06 2011-05-26 Christopher Douglas Blair Enhancements to unified communications and messaging systems
US8095601B2 (en) * 2004-10-22 2012-01-10 Microsoft Corporation Inter-proximity communication within a rendezvous federation
US8095893B2 (en) 2009-03-16 2012-01-10 Xennsoft Llc Providing an interactive and customizable organization tree having communication options
US20120102114A1 (en) * 2010-10-25 2012-04-26 Salesforce.Com, Inc. Systems and methods for tracking responses on an online social network
US20120116830A1 (en) 2010-11-05 2012-05-10 Timetrade Systems, Inc. Availability-Based Contact Routing and Scheduling System
US20120179980A1 (en) 2003-06-16 2012-07-12 Meetup, Inc. Progressive Announcements in a Web-Based Interactive Meeting Facility
US20120297316A1 (en) 2011-05-17 2012-11-22 Ferring B.V. Methods and apparatus for handling outgoing electronic messages in a user terminal
GB2492441A (en) 2011-06-30 2013-01-02 Ibm Selective delivery of content via email
US8352560B2 (en) 2009-06-30 2013-01-08 International Business Machines Corporation Controlling location and time preferences for messages
US8370948B2 (en) 2008-03-19 2013-02-05 Websense, Inc. System and method for analysis of electronic information dissemination events
US8488763B2 (en) 2009-02-27 2013-07-16 Research In Motion Limited Method and system for conference call scheduling via e-mail
US20130304761A1 (en) 2007-01-05 2013-11-14 Digital Doors, Inc. Digital Information Infrastruture and Method for Security Designated Data and with Granular Data Stores
US8655939B2 (en) 2007-01-05 2014-02-18 Digital Doors, Inc. Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor
US8694593B1 (en) * 2011-03-31 2014-04-08 Google Inc. Tools for micro-communities

Patent Citations (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6237099B1 (en) 1996-02-14 2001-05-22 Fuji Xerox Co., Ltd. Electronic document management system
US6185684B1 (en) 1998-08-28 2001-02-06 Adobe Systems, Inc. Secured document access control using recipient lists
US7353256B2 (en) * 2000-03-14 2008-04-01 Varolii Corporation Application program interface for message routing and management system
US7406507B2 (en) * 2000-03-24 2008-07-29 Piccioni Robert L Method and system for situation tracking and notification
US20010037364A1 (en) 2000-05-10 2001-11-01 Michalek Nancy R. Management of enterprise communications
US6810408B1 (en) 2000-05-31 2004-10-26 International Business Machines Corporation Method and apparatus for controlling cascading e-mail distribution
US20020013817A1 (en) 2000-07-07 2002-01-31 Collins Thomas M. Method and apparatus for distributing of e-mail to multiple recipients
US20020082894A1 (en) 2000-12-19 2002-06-27 Nec Corporation Business information system and method of managing business information
US20020116242A1 (en) * 2001-02-22 2002-08-22 Vercellone James J. Emergency response synchronization matrix
US7774408B2 (en) 2001-04-23 2010-08-10 Foundationip, Llc Methods, systems, and emails to link emails to matters and organizations
US20020178229A1 (en) 2001-04-23 2002-11-28 Pradeep Sinha Methods, systems, and emails to link emails to matters and organizations
US6769002B2 (en) 2001-11-08 2004-07-27 Jordan E. Ayan System and methods for multilevel electronic mail communication programs
WO2003046746A1 (en) 2001-11-28 2003-06-05 Peter Weissman Mail program for processing multiple email messages
US7672999B2 (en) 2002-01-08 2010-03-02 International Business Machines Corporation Transmitting common and unique information selectively to different recipients
US7529940B1 (en) 2002-11-22 2009-05-05 Novell, Inc. Securing selected data within a message
US20090222382A1 (en) * 2003-02-28 2009-09-03 Neighborhood America Platform for management of internet based public communications and public comment
US20060248175A1 (en) * 2003-05-23 2006-11-02 Jinks William R Method and system for information distribution
US20120179980A1 (en) 2003-06-16 2012-07-12 Meetup, Inc. Progressive Announcements in a Web-Based Interactive Meeting Facility
US7895263B1 (en) * 2003-06-25 2011-02-22 Everbridge, Inc. Emergency and non-emergency telecommunications geo-notification system
US20090077045A1 (en) * 2003-06-25 2009-03-19 3N Global, Inc. Online Notification System
US20090131088A1 (en) 2003-06-25 2009-05-21 3N Global, Inc. Notification System Management
US20050108351A1 (en) 2003-11-13 2005-05-19 International Business Machines Corporation Private email content
US20060015564A1 (en) 2004-07-19 2006-01-19 Steve Angelica Modulated cascading electronic messaging network
US20060041624A1 (en) 2004-08-18 2006-02-23 International Business Machines Corporation System and method for distributing an electronic message
US8095601B2 (en) * 2004-10-22 2012-01-10 Microsoft Corporation Inter-proximity communication within a rendezvous federation
US7831669B2 (en) * 2005-02-28 2010-11-09 Microsoft Corporation Reprocessing of messages in an extensible message transfer system
US7730140B2 (en) * 2005-02-28 2010-06-01 Microsoft Corporation Bifurcation of messages in an extensible message transfer system
US20080301227A1 (en) 2005-10-07 2008-12-04 Clayton James D Hierarchical document publishing
US20070192465A1 (en) 2006-02-10 2007-08-16 Modarressi Abdi R Methods, systems, and products for accessing common functions for multiple applications
US20070226300A1 (en) 2006-03-27 2007-09-27 Suzelle Smith System and method to prevent the sending of email messages to unqualified recipients
US20080189162A1 (en) * 2006-10-20 2008-08-07 Ray Ganong System to establish and maintain intuitive command and control of an event
US8655939B2 (en) 2007-01-05 2014-02-18 Digital Doors, Inc. Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor
US20130304761A1 (en) 2007-01-05 2013-11-14 Digital Doors, Inc. Digital Information Infrastruture and Method for Security Designated Data and with Granular Data Stores
US20080168135A1 (en) 2007-01-05 2008-07-10 Redlich Ron M Information Infrastructure Management Tools with Extractor, Secure Storage, Content Analysis and Classification and Method Therefor
US20080222257A1 (en) 2007-03-10 2008-09-11 Shamik Mukherjee Systems and methods for sending customized emails to recipient groups
US20100100600A1 (en) 2007-03-29 2010-04-22 Thompson Simon G Distributing data messages
US20090049134A1 (en) 2007-08-16 2009-02-19 David Bruce Kumhyr Method for delaying delivery of e-mail content
US20090171744A1 (en) * 2007-12-28 2009-07-02 Hake Richard L System and method for reducing employee training time and distributing corporate and job information to employees
US20090198777A1 (en) 2008-01-31 2009-08-06 Embarq Holdings Company Llc System and method for a messaging assistant
US20110126126A1 (en) 2008-03-06 2011-05-26 Christopher Douglas Blair Enhancements to unified communications and messaging systems
US8370948B2 (en) 2008-03-19 2013-02-05 Websense, Inc. System and method for analysis of electronic information dissemination events
US20090265755A1 (en) 2008-04-18 2009-10-22 International Business Machines Corporation Firewall methodologies for use within virtual environments
US20090319623A1 (en) 2008-06-24 2009-12-24 Oracle International Corporation Recipient-dependent presentation of electronic messages
US7890593B2 (en) 2008-07-17 2011-02-15 International Business Machines Corporation Sectional E-mail Transmission
US20100098231A1 (en) 2008-10-22 2010-04-22 Randolph Wohlert Systems and Methods for Providing a Personalized Communication Processing Service
US8488763B2 (en) 2009-02-27 2013-07-16 Research In Motion Limited Method and system for conference call scheduling via e-mail
US20100229246A1 (en) 2009-03-04 2010-09-09 Connor Stephen Warrington Method and system for classifying and redacting segments of electronic documents
US8407805B2 (en) 2009-03-04 2013-03-26 Titus Inc. Method and system for classifying and redacting segments of electronic documents
US8095893B2 (en) 2009-03-16 2012-01-10 Xennsoft Llc Providing an interactive and customizable organization tree having communication options
US20110029622A1 (en) * 2009-06-24 2011-02-03 Walker Jay S Systems and methods for group communications
US8352560B2 (en) 2009-06-30 2013-01-08 International Business Machines Corporation Controlling location and time preferences for messages
US20120102114A1 (en) * 2010-10-25 2012-04-26 Salesforce.Com, Inc. Systems and methods for tracking responses on an online social network
US20120116830A1 (en) 2010-11-05 2012-05-10 Timetrade Systems, Inc. Availability-Based Contact Routing and Scheduling System
US8694593B1 (en) * 2011-03-31 2014-04-08 Google Inc. Tools for micro-communities
US20120297316A1 (en) 2011-05-17 2012-11-22 Ferring B.V. Methods and apparatus for handling outgoing electronic messages in a user terminal
DE102012209957A1 (en) 2011-06-30 2013-01-03 International Business Machines Corporation Selective delivery of content by electronic mail
US20130007140A1 (en) 2011-06-30 2013-01-03 International Business Machines Corporation Selective delivery of content via electronic mail
GB2492441A (en) 2011-06-30 2013-01-02 Ibm Selective delivery of content via email

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
U.S. Appl. No. 13/172,894, Appeal Brief, Jun. 16, 2014, 33 pg.
U.S. Appl. No. 13/172,894, Final Office Action, Jan. 13, 2014, 24 pg.
U.S. Appl. No. 13/172,894, Non-Final Office Action, Aug. 22, 2013, 20 pg.
U.S. Appl. No. 13/172,894, Notice of Allowance, Dec. 19, 2014, 17 pg.
UK Patent Application GB1207278.1 Combined Search and Examination Report, Aug. 15, 2012, 10 pgs.

Also Published As

Publication number Publication date
US9021030B2 (en) 2015-04-28
US20130007154A1 (en) 2013-01-03
US20130007140A1 (en) 2013-01-03
GB2492441A (en) 2013-01-02
DE102012209957A1 (en) 2013-01-03
GB201207278D0 (en) 2012-06-06

Similar Documents

Publication Publication Date Title
US11902234B2 (en) Prohibited content propagation using a social network data structure
US10050923B1 (en) Mail bot and mailing list detection
KR101853980B1 (en) Zone classification of electronic mail messages
US11159475B2 (en) Sending a read receipt to each user specified on a read receipt distribution list
US9495519B2 (en) Communications security management
US20120278407A1 (en) Automatic uploading of attachments to a shared location
US9696875B2 (en) Managing an e-mail response
US11362982B2 (en) Mail bot and mailing list detection
US8990315B2 (en) Sending messages with limited awareness of recipients
US8930825B2 (en) Graphically indicating relevancy of electronic messages
US9619664B2 (en) Systems and methods for handling electronic messages
US10250543B2 (en) Deduplication of e-mail content by an e-mail server
US9106601B2 (en) Selective delivery of content via electronic mail
US20130054710A1 (en) Categorizing email recipients into logical groups when sending a mass email
US9461956B2 (en) Adaptive guidance for managing a communications repository
US9282184B2 (en) Managing and storing electronic messages during recipient unavailability
US9143472B2 (en) Updating an e-mail recipient list
US20160117769A1 (en) Stakeholder notification
US20160366091A1 (en) Email thread sequence management

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8